Book picks similar to
Silk Road by Eileen Ormsby


non-fiction
true-crime
crime
nonfiction

Dangerous Personalities: An FBI Profiler Shows You How to Identify and Protect Yourself from Harmful People


Joe Navarro - 2014
    So often the reporters say that "there were some signs, but nobody acted." the scary part about these tragedies is that less than 1% of criminals are incarcerated for their crimes, meaning that for every headline, there are millions of dangerous situations in which average people find themselves. On top of that, how can ordinary people identify threats from those who may not hurt them physically but can devastate their lives on a daily basis—the crazy coworkers, out-of control family members, or relentless neighbors?In Dangerous Personalities, former FBI profiler Joe Navarro shows readers how to identify the four most common "dangerous personalities" and analyze how much of a threat each one can be: the Narcissist, the Predator, the Paranoid, and the Unstable Personality. Along the way, readers learn how to protect themselves both immediately and long-term—as well as how to recover from the trauma of being close to such a destructive force.

The Glass Cage: How Our Computers Are Changing Us


Nicholas Carr - 2014
    Even as they bring ease to our lives, these programs are stealing something essential from us.Drawing on psychological and neurological studies that underscore how tightly people’s happiness and satisfaction are tied to performing hard work in the real world, Carr reveals something we already suspect: shifting our attention to computer screens can leave us disengaged and discontented.From nineteenth-century textile mills to the cockpits of modern jets, from the frozen hunting grounds of Inuit tribes to the sterile landscapes of GPS maps, The Glass Cage explores the impact of automation from a deeply human perspective, examining the personal as well as the economic consequences of our growing dependence on computers.With a characteristic blend of history and philosophy, poetry and science, Carr takes us on a journey from the work and early theory of Adam Smith and Alfred North Whitehead to the latest research into human attention, memory, and happiness, culminating in a moving meditation on how we can use technology to expand the human experience.

The Bitcoin Standard: The Decentralized Alternative to Central Banking


Saifedean Ammous - 2018
    Can this young upstart money challenge the global monetary order? Economist Saifedean Ammous traces the history of the technologies of money to seashells, limestones, cattle, salt, beads, metals, and government debt, explaining what gave these technologies their monetary role, what makes for sound money, and the benefits of a sound monetary regime to economic growth, innovation, culture, trade, individual freedom, and international peace.The monetary and historical analysis sets the stage for understanding the mechanics of the operation of Bitcoin, the reasons for its initial success, and the role it could play in an information economy. Rather than serving as a currency and network for consumer purchases, the author argues Bitcoin is better suited as a store of value and network for settlement between large financial institutions. With an automated and perfectly predictable monetary policy, and the ability to perform final settlement of large sums across the world in a matter of minutes, Bitcoin's true importance may just lie in providing a decentralized, neutral, free-market alternative to national central banks.

Black Code: The Battle for the Future of Cyberspace


Ronald J. Deibert - 2011
    It is difficult to imagine a world without instant access and 24/7 connectivity. We have reengineered our business, governance, and social relations around a planetary network unlike any that has come before. And, as with any social transformation, there have been unintended consequences.     In Black Code, Ron Deibert examines the profound effect that cyberspace is having on the relationship between citizens and states, on the private and public spheres, and on domestic and international affairs. Cyberspace has brought us a world of do-it-yourself signals intelligence, he argues, and WikiLeaks is only a symptom of a much larger phenomenon to which governments, businesses, and individuals will have to get accustomed. Our lives have been turned inside out by a digital world of our own spinning.     Fast-paced, revealing, and sometimes terrifying, Black Code takes readers into the shadowy realm of cybersecurity, offering insight into the very future of cyberspace and revealing what new rules and norms we will need to adopt in order to survive in this new environment.

The Confidence Game: Why We Fall for It . . . Every Time


Maria Konnikova - 2015
    How do they do it? Why are they successful? And what keeps us falling for it, over and over again? These are the questions that journalist and psychologist Maria Konnikova tackles in her mesmerizing new book.   From multimillion-dollar Ponzi schemes to small-time frauds, Konnikova pulls together a selection of fascinating stories to demonstrate what all cons share in common, drawing on scientific, dramatic, and psychological perspectives. Insightful and gripping, the book brings readers into the world of the con, examining the relationship between artist and victim. The Confidence Game asks not only why we believe con artists, but also examines the very act of believing and how our sense of truth can be manipulated by those around us.

Acid Dreams: The CIA, LSD and the Sixties Rebellion


Martin A. LeeKen Kesey - 1985
    Martin Lee and Bruce Shlain's exhaustively researched and astonishing account—part of it gleaned from secret government files—tells how the CIA became obsessed with LSD as an espionage weapon during the early 1950s and launched a massive covert research program, in which countless unwitting citizens were used as guinea pigs. Though the CIA was intent on keeping the drug to itself, it ultimately couldn't prevent it from spreading into the popular culture; here LSD had a profound impact and helped spawn a political and social upheaval that changed the face of America. From the clandestine operations of the government to the escapades of Timothy Leary, Abbie Hoffman, Ken Kesey and his Merry Pranksters, Allen Ginsberg, and many others, Acid Dreams provides an important and entertaining account that goes to the heart of a turbulent period in our history.Also called: Acid Dreams. The Complete Social History of LSD: The CIA, The Sixties, and Beyond

The Googlization of Everything: (And Why We Should Worry)


Siva Vaidhyanathan - 2010
    Into this creative chaos came Google with its dazzling mission—“To organize the world’s information and make it universally accessible”—and its much-quoted motto, “Don’t be evil.” In this provocative book, Siva Vaidhyanathan examines the ways we have used and embraced Google—and the growing resistance to its expansion across the globe. He exposes the dark side of our Google fantasies, raising red flags about issues of intellectual property and the much-touted Google Book Search. He assesses Google’s global impact, particularly in China, and explains the insidious effect of Googlization on the way we think. Finally, Vaidhyanathan proposes the construction of an Internet ecosystem designed to benefit the whole world and keep one brilliant and powerful company from falling into the “evil” it pledged to avoid.

Company


Max Barry - 2006
    From the outside, Zephyr is just another bland corporate monolith, but behind its glass doors business is far from usual: the beautiful receptionist is paid twice as much as anybody else to do nothing, the sales reps use self help books as manuals, no one has seen the CEO, no one knows exactly what they are selling, and missing donuts are the cause of office intrigue. While Jones originally wanted to climb the corporate ladder, he now finds himself descending deeper into the irrational rationality of company policy. What he finds is hilarious, shocking, and utterly telling.

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Database Nation: The Death of Privacy in the 21st Century


Simson Garfinkel - 2000
    Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Permanent Record


Edward Snowden - 2019
    The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online—a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Flawless: Inside the Largest Diamond Heist in History


Scott Andrew Selby - 2010
    They did so without tripping an alarm or injuring a single guard in the process. Although the crime was perfect, the getaway was not. The police zeroed in on a band of professional thieves fronted by Leonardo Notarbartolo, a dapper Italian who had rented an office in the Diamond Center and clandestinely cased its vault for over two years.  The “who” of the crime had been answered, but the “how” remained largely a mystery. Enter Scott Andrew Selby, a Harvard Law grad and diamond expert, and Greg Campbell, author of Blood Diamonds, who undertook a global goose chase to uncover the true story behind the daring heist. Tracking the threads of the story throughout Europe—from Belgium to Italy, in seedy cafés and sleek diamond offices—the authors sorted through an array of conflicting details, divergent opinions and incongruous theories to put together the puzzle of what actually happened that Valentine’s Day weekend.This real-life Ocean’s Eleven—a combination of diamond history, journalistic reportage, and riveting true-crime story—provides a thrilling in-depth study detailing the better-than-fiction heist of the century.

Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide


Darril Gibson - 2011
    The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/

Enemy of All Mankind: A True Story of Piracy, Power, and History's First Global Manhunt


Steven Johnson - 2020
    But every now and then, someone strikes a match that lights up the whole planet. Henry Every was the seventeenth century's most notorious pirate. The press published wildly popular--and wildly inaccurate--reports of his nefarious adventures. The British government offered enormous bounties for his capture, alive or (preferably) dead. But Steven Johnson argues that Every's most lasting legacy was his inadvertent triggering of a major shift in the global economy. Enemy of All Mankind focuses on one key event--the attack on an Indian treasure ship by Every and his crew--and its surprising repercussions across time and space. It's the gripping tale one of the most lucrative crimes in history, the first international manhunt, and the trial of the seventeenth century.Johnson uses the extraordinary story of Henry Every and his crimes to explore the emergence of the East India Company, the British Empire, and the modern global marketplace: a densely interconnected planet ruled by nations and corporations. How did this unlikely pirate and his notorious crime end up playing a key role in the birth of multinational capitalism? In the same mode as Johnson's classic non-fiction historical thriller The Ghost Map, Enemy of All Mankind deftly traces the path from a single struck match to a global conflagration.

The Good Girls: An Ordinary Killing


Sonia Faleiro - 2021
    Sixteen-year-old Padma sparked and burned. Fourteen-year-old Lalli was an incorrigible romantic.They grew up in Katra Sadatganj, an eye-blink of a village in western Uttar Pradesh crammed into less than one square mile of land. It was out in the fields, in the middle of mango season, that the rumors started.Then one night in the summer of 2014 the girls went missing; and hours later they were found hanging in the orchard. Who they were, and what had happened to them, was already less important than what their disappearance meant to the people left behind.In the ensuing months, the investigation into their deaths would implode everything that their small community held to be true, and instigate a national conversation about sex and violence. Slipping deftly behind political maneuvering, caste systems and codes of honor in a village in northern India, The Good Girls returns to the scene of Padma and Lalli's short lives and shameful deaths, and dares to ask: what is the human cost of shame?